The Computational Complexity

نویسنده

  • Eric Allender
چکیده

I would like to say that I am thrilled to take over as editor of this column. But I am more \daunted" than \thrilled". Juris Hartmanis started this column back in issue # 31 of the Bulletin, and it has been an extremely successful run. I'm not eager to invite comparison. In upcoming editions of this column, you should expect to nd concise and readable accounts of some exciting developments and trends in complexity theory. Often, this may take the form of a survey or tutorial on some body of recent work. In this issue of the Bulletin, however, I will survey some aspects of complexity theory that can hardly be considered \recent". Instead, I will focus on some fundamental truths relating complexity theory to practical computing. These truths deserve repeating, lest they become forgotten. As a bonus, this edition of the Computational Complexity Column concludes with a report by Jack Lutz on the recent sixtieth birthday celebration for Ron Book. Book has had a profound and lasting innuence on the eld of complexity theory, and I am happy to be able to include a report on such an event in this inaugural column. I am surprised at how often I encounter skepticism about the relevance of an asymp-totic lower bound on the computational complexity of a function. Admittedly, the grounds for this skepticism may initially sound plausible, as the following \straw man" argument may illustrate: Let's assume that you've shown that function f requires time 2 (n) to compute, and also requires circuit size 2 (n). This still doesn't tell me that I won't be able to compute f for my application. I'm never going to need 1 to deal with inputs with more than a billion bits, and your lower bound only says that there is some > 0 such that the circuit size is at least 2 n. But if turns out to be one-billionth, then this tells me nothing. In fact, the set I'm interested in is nite, and all nite sets are regular, and hence they're recognizable in linear time. I'm afraid that the sort of asymptotic bounds provided by complexity theory miss the boat completely! If you nd this argument convincing, please read further. It is true that lower bounds in complexity theory are usually stated in terms of asymptotic bounds (in the rare cases when actual lower bounds are able to be presented …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reduction of Computational Complexity in Finite State Automata Explosion of Networked System Diagnosis (RESEARCH NOTE)

This research puts forward rough finite state automata which have been represented by two variants of BDD called ROBDD and ZBDD. The proposed structures have been used in networked system diagnosis and can overcome cominatorial explosion. In implementation the CUDD - Colorado University Decision Diagrams package is used. A mathematical proof for claimed complexity are provided which shows ZBDD ...

متن کامل

On the computational complexity of finding a minimal basis for the guess and determine attack

Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...

متن کامل

Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity

In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...

متن کامل

On the Computational Complexity of the Domination Game

The domination game is played on an arbitrary graph $G$ by two players, Dominator and Staller. It is known that verifying whether the game domination number of a graph is bounded by a given integer $k$ is PSPACE-complete. On the other hand, it is showed in this paper that the problem can be solved for a graph $G$ in $mathcal O(Delta(G)cdot |V(G)|^k)$ time. In the special case when $k=3$ and the...

متن کامل

Increasing the Performance of OFDM Systems by PAPR Reduction in PTS Technique using Election Optimization Algorithm

Orthogonal Frequency Division Multiplexing (OFDM) is a useful technology in wireless communications that provides high-rate data transmission in multipath fading channels. The advantages of OFDM systems are the high spectral efficiency and strong resistance to frequency selective fading. In OFDM systems, a large number of sub-carriers are used to modulate the symbols causing the time-domain OFD...

متن کامل

Fast Intra Mode Decision for Depth Map coding in 3D-HEVC Standard

three dimensional- high efficiency video coding (3D-HEVC) is the expanded version of the latest video compression standard, namely high efficiency video coding (HEVC), which is used to compress 3D videos. 3D videos include texture video and depth map. Since the statistical characteristics of depth maps are different from those of texture videos, new tools have been added to the HEVC standard fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998